United Nations

Since The Internet welcomes all kinds of feelings, come find yourself in Sensi Sessions. Each Sensi Session offers a monthly roundup of music that's slightly sensitive; here you'll find music that goes from the vibe of Rich Homie Quan's "Type of Way" to deep thoughts in minimal dance music. Sensi is whatever you let it be, and this month's selection ranges from weirdo pop from Australian-born Martin King, Drake vs Jhené Aiko and a Le1f cut that goes extra deep.

There's no single culprit responsible for deforestation: around the world, forest cover is lost because of fires, disease, logging, clear-cutting, and myriad other factors. And the environmental consequences threaten to be severe, especially given that deforestation causes an estimated 15 percent of global greenhouse gas emissions.

And before experts can effectively mitigate the problem, they need to know where it's happening — and to what extent. Now, a collaborative effort led by the University of Maryland (and including both Google and NASA) has created the first-ever high-resolution map that tracks forest gains and losses over time. Described this week in the journal Science, the map's creation depended on more than a decade of satellite imagery provided by Landsat — a satellite program operated by the US Geological Survey to capture and store images of Earth — combined with the processing prowess of Google Earth Engine.

It’s the final lap of the 73BC Nicopolis GP and the crowd are going walnuts. After narrowly avoiding a crashed chariot in lane 4 and the threshing wheel blades of the mad Scythian in lane 6, I whip my knackered nags through an unexpected gap in the frontrunners, and find myself leading by a good pertica. There’s now only one 180-degree turn and a furlong of foam-flecked dust between me and 25,000 denarius. This is it. My team, The Ballista Boys, are about to write themselves into chariot racing history.

The Ludum Dare jams are splendid occasions, bringing designers together in person and across the strands of this electronic web. Every event throws out at least a handful of games (I can reliably carry seven games in one hand) that are either brilliant proofs of concept or miniature masterpieces in their own right. Now that the voting results for the Ludum Dare 28 are in, I’ve been playing through the crop’s creamier portions. The league tables are sorted into categories – Overall, Innovation, Fun, Theme, Graphics, Audio, Humour and Mood – and I’ve included the winning entry in each. There is a well of free gaming goodness below.

Yesterday marked World Refugee Day, as the United Nations high commissioner for refugees, António Guterres, visited Jordan to highlight the 1.6 million registered people who have fled the ongoing conflict in Syria. The UN refugee agency, which was set up in 1950 to aid those still displaced after World War II, reports that there are some 10.5 million refugees worldwide. -- Lloyd Young ( 29 photos total)Afghan refugee children, swim in muddy water created from a broken water pipe, on the outskirts of Islamabad, Pakistan, on June 17. Pakistan hosts over 1.6 million registered Afghans, the largest and most protracted refugee population in the world, according to the UN refugee agency. (Muhammed Muheisen/Associated Press)

June 20th is World Refugee Day, established by the United Nations to raise awareness of the 43.7 million refugees and internally displaced people around the world. They are men, women and children forced to flee their homes due to persecution, violence or conflict. You can read more about this campaign and make donations on the the World Refugee Web site created by the UNHCR.

Above are a few images from Reportage photographers who have focused their attention on refugee crises over the years. Clockwise from top:

SOMALILAND - MARCH 4, 2010: Tired Somali refugees sleep in the desert after traveling all night through rain and muddy roads on their trip to Yemen. Every year, thousands of people risk their lives crossing the Gulf of Aden to escape conflict and poverty in Somalia. (Photo by Ed Ou/Reportage by Getty Images)

LAIZA, KACHIN STATE – DECEMBER 20, 2011: Internally displaced refugees wait for food stamps to be handed out in Jeyang Camp in northern Myanmar. After a 17-year ceasefire, and despite promises to the contrary from Myanmar President Thein Sein, the Burmese Army went on an offensive in June 2011. (Photo by Christian Holst/Reportage by Getty Images)

SOUTH SUDAN - 2012: The shoes of Gasim Issa, who walked for 20 days on his journey from Blue Nile State, Sudan, to South Sudan. He is in his 50s. (Photo by Shannon Jensen)

NORTH KIVU, DEMOCRATIC REPUBLIC OF CONGO - OCTOBER, 2012: A camp of refugees who fled the conflict between the government and M23 rebels. (Photo by Alvaro Ybarra Zavala/Reportage by Getty Images)

“Female photojournalists can’t be found in Gaza. It’s a war zone and the nature of news is mostly violence,” says Eman Mohammed, a 25-year-old Palestinian journalist, wife and mother who lives in the Gaza Strip and knows all to well about the struggles women face in the Israeli-occupied territory. At the age of 19, Mohammed [...]

List your passwords alphabetically, so it's easy for you and others to find them!

Give three password crackers a list of 16,000 cryptographically hashed passwords and ask them to come up with the plaintext phrases they correspond to. That's what Ars did this week in Dan Goodin's Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331.”Turns out, with just a little skill and some good hardware, three prominent password crackers were able to decode up to 90 percent of the list using common techniques.

The hashes the security experts used were converted using the MD5 cryptographic hash function, something that puzzled our readers a bit. MD5 is seen as a relatively weak hash function compared to hashing functions like bcrypt. flunk wrote, "These articles are interesting but this particular test isn't very relevant. MD5 wasn't considered a secure way to hash passwords 10 years ago, let alone now. Why wasn't this done with bcrypt and salting? That's much more realistic. Giving them a list of passwords that is encrypted in a way that would be considered massively incompetent in today's IT world isn't really a useful test."

To this, Goodin replied that plenty of Web services employ weak security practices: "This exercise was entirely relevant given the huge number of websites that use MD5, SHA1, and other fast functions to hash passwords. Only when MD5 is no longer used will exercises like this be irrelevant." Goodin later went on to cite the recent compromises of "LinkedIn, eHarmony, and LivingSocial," which were all using "fast hashing" techniques similar to MD5.